Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58578: CWE-770 Allocation of Resources Without Limits or Throttling in SICK AG Enterprise Analytics

0
Low
VulnerabilityCVE-2025-58578cvecve-2025-58578cwe-770
Published: Mon Oct 06 2025 (10/06/2025, 06:47:30 UTC)
Source: CVE Database V5
Vendor/Project: SICK AG
Product: Enterprise Analytics

Description

A user with the appropriate authorization can create any number of user accounts via an API endpoint using a POST request. There are no quotas, checking mechanisms or restrictions to limit the creation.

AI-Powered Analysis

AILast updated: 10/06/2025, 07:11:29 UTC

Technical Analysis

CVE-2025-58578 is a vulnerability classified under CWE-770 (Allocation of Resources Without Limits or Throttling) affecting all versions of SICK AG's Enterprise Analytics product. The flaw allows any user with appropriate authorization to create an unlimited number of user accounts through a POST request to an API endpoint. The absence of quotas, rate limiting, or any form of restriction on account creation means that an attacker or even a legitimate user could exhaust system resources such as database storage, memory, or processing capacity. This can degrade the availability of the Enterprise Analytics system, potentially causing denial of service or performance issues. The vulnerability does not impact confidentiality since no sensitive data is exposed, nor does it directly compromise data integrity beyond the creation of extraneous accounts. Exploitation requires authenticated access but no additional user interaction, making it a risk primarily from insider threats or compromised credentials. No patches or fixes have been released as of the publication date, and no known exploits have been reported in the wild. Given the product's use in industrial analytics and automation environments, the vulnerability could disrupt critical operational insights if exploited at scale.

Potential Impact

For European organizations, especially those in manufacturing, logistics, and industrial automation sectors relying on SICK AG's Enterprise Analytics, this vulnerability poses a risk of service disruption. Unrestricted account creation can lead to resource exhaustion, causing system slowdowns or outages that impact operational decision-making and monitoring. While confidentiality and integrity impacts are minimal, availability degradation can affect business continuity and operational efficiency. Organizations with large user bases or complex deployments may face increased risk if internal controls on user management are weak. Additionally, the need for authenticated access limits external attackers but raises concerns about insider threats or compromised credentials. The lack of patches means organizations must rely on compensating controls until a fix is available. Disruptions in analytics services could have downstream effects on production lines, supply chain visibility, and compliance reporting, which are critical in European industrial contexts.

Mitigation Recommendations

To mitigate this vulnerability, organizations should implement strict internal policies governing user account creation, limiting this capability to a minimal number of trusted administrators. Monitoring and alerting on unusual spikes in account creation via the API should be established to detect potential abuse early. Network segmentation can restrict API access to trusted management networks, reducing exposure. Employing multi-factor authentication (MFA) for all users with account creation privileges can reduce the risk of credential compromise. Until a vendor patch is available, consider deploying web application firewalls (WAFs) or API gateways that can enforce rate limiting and quota controls on the user creation endpoint. Regular audits of user accounts should be conducted to identify and remove unauthorized or redundant accounts. Finally, maintain close communication with SICK AG for updates on patches or official remediation guidance.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
SICK AG
Date Reserved
2025-09-03T08:58:14.354Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e369cfbd6176610b49ca8b

Added to database: 10/6/2025, 7:03:43 AM

Last enriched: 10/6/2025, 7:11:29 AM

Last updated: 10/6/2025, 8:34:19 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats